CN100458810C - 保护蓝牙设备的方法及系统 - Google Patents
保护蓝牙设备的方法及系统 Download PDFInfo
- Publication number
- CN100458810C CN100458810C CNB2006100588610A CN200610058861A CN100458810C CN 100458810 C CN100458810 C CN 100458810C CN B2006100588610 A CNB2006100588610 A CN B2006100588610A CN 200610058861 A CN200610058861 A CN 200610058861A CN 100458810 C CN100458810 C CN 100458810C
- Authority
- CN
- China
- Prior art keywords
- equipment
- bluetooth
- trusted devices
- protected
- sensitive data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
本发明涉及一种使用蓝牙设备保护其它蓝牙设备上的敏感数据的方法、设备和系统。蓝牙设备和“信任”蓝牙设备配对。当与信任设备的联系丢失时,被保护的蓝牙设备上的专用敏感数据就自动加密。当联系恢复时,数据就自动解密。在选择性的实施例中,被保护的设备可以与多个信任设备相关联,并且被保护设备为每个信任设备指定不同的敏感数据。通过这种方式,多个用户可以共享公共的、“公开的”蓝牙设备而不考虑当设备不被用户使用时,其他用户会访问他们的设备上的敏感数据。
Description
技术领域
本发明涉及无线安全,更具体地说,涉及一种保护蓝牙设备的方法和系统。本发明特别适用于当设备不再在另一个可信任的蓝牙设备近邻时,加密蓝牙设备上的敏感数据的系统。
背景技术
越来越多的个人数据被储存于更小和更多的移动设备上。如果这些设备的一个被错放了,可能会危及关于身份、访问码或者的商业信息的敏感数据的安全,这种风险随着它们可以存储的信息数量和它们的广泛应用而增加。要求输入安全码或者密码是一个部分解决方案,但这种解决方法的功效降低到这种程度:由于不便,设备停留在非锁定状态或者使用该特征的安全特征不能执行。
对于本领域的一般技术人员来说,将这样的系统与如参照附图的本申请的剩余部分所述的本发明的某些方面进行比较,常规和传统方法的更多的局限和不足会变得明显。
发明内容
本发明涉及一种保护存储在蓝牙设备上的数据的方法和系统,例如,结合至少一个附图充分描述的,在权利要求中有更完整的阐述。
根据本发明的一个方面,提供了一种保护蓝牙设备的方法,包括:
g.配对两个蓝牙设备;
h.指定至少一个所述配对设备为另一个设备即被保护设备的信任设备;
i.指定至少一部分存储在所述被保护设备上的数据为敏感数据;
j.检测何时信任设备不再在所述被保护设备的近邻;
k.当信任设备不再在所述被保护设备的近邻时,加密所述敏感数据,
l.当检测到所述信任设备在所述被保护设备的近邻时,解密所述敏感数据。
优选地,所述方法进一步包括在定时器溢出后加密所述敏感数据。
优选地,当所述信任设备不再在所述被保护设备近邻时,将被保护设备锁定。
优选地,被保护设备和一个以上的信任设备配对。
优选地,被保护设备也是信任设备。
优选地,信任设备也是被保护设备。
优选地,被保护设备为多个信任设备中的每一个指定不同的敏感数据。
根据本发明的一个方面,提供了一种保护蓝牙设备上的数据的系统,包括两个配对的蓝牙设备,其中,所述设备的第一个被指定为信任设备,所述设备的第二个包含敏感数据,并且当所述设备的所述第一个离开所述设备的所述第二个的近邻时,所述设备的所述第二个设备加密所述敏感数据。
优选地,在定时器溢出后,所述设备的所述第二个加密所述数据。
优选地,当所述设备的所述第一个不再在所述设备的所述第二个近邻时,所述设备的所述第二个被锁定。
优选地,所述系统进一步包含附加的信任和被保护设备。
优选地,所述设备的所述第二个也是信任设备。
优选地,所述设备的所述第一个也是被保护设备。
优选地,所述设备的所述第二个与比所述设备的所述第一个多至少一个的设备配对。
优选地,所述设备的所述第二个包括所述至少一个以上的设备和所述设备的所述第一个的单独敏感数据。
根据本发明的一个方面,提供了一种集成电路,所述集成电路包括包括应用层,所述应用层执行包括以下步骤的方法:
g.配对两个蓝牙设备;
h.指定至少一个所述配对设备为另一个设备即被保护设备的信任设备;
i.指定至少一部分存储在所述被保护设备上的数据为敏感数据;
j.检测何时信任设备不再在所述被保护设备的近邻;
k.当信任设备不再在所述被保护设备的近邻时,加密所述敏感数据;
l.当检测到所述信任设备在所述被保护设备的近邻时,解密所述敏感数据。
优选地,集成电路进一步延迟敏感数据的加密直到定时器溢出。
优选地,所述集成电路和并入专用安全表链(security fob)。
优选地,所述集成电路与附加的所述信任设备配对。
优选地,所述的集成电路为每个所述信任设备指定不同的敏感数据。
优选地,所述的集成电路也被指定为信任设备。
从以下的描述和附图中,本发明的这些和其它优点、方面和新颖性特征、及其示例性实施例的细节,都将得到更完全的理解。
附图说明
下面将结合附图及实施例对本发明作进一步说明,附图中:
图1基本蓝牙微微网的示意图。
图2是简化的典型协议栈。
图3是根据本发明的典型实施例的典型蓝牙硬件设备的框图,所述蓝牙硬件运行图2中的协议栈。
图4是根据本发明典型实施例、当信任蓝牙设备进入和离开被保护设备的周围区域时,本发明的一种方法的流程图。
具体实施方式
本发明的实施例涉及一种检测蓝牙设备近邻的方法和系统。本发明的实施例涉及一种定位蓝牙设备的近邻和交换密钥的方法和系统。另外的实施例是当信任设备不再存在时,加密数据或者锁定设备。
蓝牙无线技术无需有线连接,从而用来改革个人连接方式。蓝牙是为便携式电脑、移动电话和其它便携式和手持设备之间提供链接的小型化、低成本无线解决方案的标准。蓝牙的特点在于低功耗和小范围,以及蓝牙设备自动检测和连接到其它附近的蓝牙设备的能力,通常是10米或更小。
关于蓝牙
蓝牙无线技术是允许智能设备间通过无线、短距离通信进行互相通信的国际公开标准。该技术可以让任何类型的电子设备——从计算机和蜂窝电话到键盘和耳机——建立自己的连接,不需要连接线、电缆和其他任何来自用户的直接作用。目前蓝牙被集成到许许多多的消费产品中,包括膝上型电脑、PDA、蜂窝电话和打印机,以及每天出现的更多产品。
蓝牙如何工作
蓝牙是在2.4GHz免执照频段内运作的跳频扩频(FHSS)射频系统。它的低功率传输可用于大约十米的典型范围。互相连接的设备组成了已知的微微网,网络里最多有七个主动设备(active device)。图1示出了包括三个蓝牙设备即耳机103、膝上型电脑105和蜂窝电话107的微微网101。微微网里的设备共享数据容量,设备间的最大数据吞吐量大约为723千比特每秒。
蓝牙有用于传输数据和实现应用需求的高级特征的协议栈。协议栈包括几种为不同目的设计的不同协议。规范(profile)或者应用位于协议栈上。蓝牙还有用于链接管理和基带控制的低层协议栈。图2是简化的典型协议栈201。该栈包括规范203、BTM 205、RFCOMM 207、SDP 209、L2CAP 211、HCI 213和低层栈215。应用层217包括计算机程序,所述计算机程序实际上执行利用蓝牙功能的有利方法。
蓝牙硬件设备通常是包括一个或者两个芯片的高集成度系统。图3是典型蓝牙硬件设备的框图,所述蓝牙硬件设备包括射频IC 303和基带IC 305。
蓝牙基带芯片包括核心处理器例如带有集成存储器的ARM7307、蓝牙基带309和几个其它外围器件。射频在单个的芯片303上实现。ARM7处理器运行包括低层协议栈、上层协议栈和内嵌规范的所有要求的软件。这种类型的单个CPU设备允许小的、低功耗的和低成本的解决方案。
软件“栈”预期在栈的高层插入有用的应用程序。这些应用程序可以被设计成利用蓝牙低层、基于蓝牙的射频链接来实现功能。
蓝牙无线网络的短距离特性允许其被用于设备邻近性检测。基于设备的出现和消失,手持设备或台式计算机上的敏感数据可以不被用户干预、自动地加密。根据信任蓝牙设备的近邻与否加密和解密敏感数据。通过使用设备配对程序交换蓝牙链接码、并明确地将设备标记为可信任的,来建立信任关系。一旦这样的关系建立,即根据信任设备的可用性对敏感数据自动加密和解密。信任设备可以包括蜂窝电话、台式计算机、膝上电脑或者特别设备例如蓝牙钥链。设备进行常规的蓝牙扫描,来检测区域里的信任设备。如果没有设备被检测到,标志为敏感的文件区域上的数据将将在定时溢出后自动加密。一旦信任设备靠近,数据被自动解密并准备好被用户浏览/编辑。可选地,当没有找到信任设备时,设备可以锁定访问。
根据本发明的方法可以扩展到蓝牙桌面设备。另外,某个文件区域可以标记为敏感的。蓝牙软件为信任的个人设备例如蜂窝电话、个人数据助理或者蓝牙钥链执行常规扫描。如果没有发现信任设备,敏感数据自动加密并且屏幕可选地被用户关闭。这允许用户离开他的桌子并且让桌上电脑自动锁定直至他或她回来。
本发明可以充分地集成到集成电路中,例如蓝牙芯片。该芯片带有可机读存储器,其上存储有带有检测蓝牙设备邻近区域的代码部分的计算机程序。该程序包括至少一个代码部分,所述代码部分可被机器执行,促使机器执行包括充分如下所示和所描述的步骤。
本发明的集成电路可以还包含执行根据本发明的方法的应用层。集成电路最好被连接到蓝牙射频。集成电路可以还有唯一的硬件标志符。
蓝牙标准规定了允许一个设备使自己与另一个设备关联的配对程序。配对程序在蓝牙1.2核心标准、第三卷、第3.3节详细描述。
在典型实施例里,系统使用至少两个设备。初始地,设备没有配对。一旦设备相互靠近,用户可以允许他们相互关联。一旦配对,与发明一致的方法可以用来将配对的设备标记为信任设备。然后每个设备识别另一个设备为信任设备。一旦这种关联建立,不论何时检测到信任设备不在的时候,每个设备的软件可以用来锁定设备或加密指定的文件。任何蓝牙设备可以是信任设备和/或被保护设备。例如,蜂窝电话107可以是被保护设备即手提电脑105的信任设备。耳机103可以是被保护设备即蜂窝电话107的信任设备。
结合图4描述了本发明的一个方法的逻辑流程,图4从被保护设备的角度以流程图的形式示出了本发明的典型步骤。首先,用户在步骤401选择优选的“蓝牙”密码或信任设备。接着,在步骤403,被保护设备和信任设备配对。在步骤405,在为功率消耗或安全选定的时间间隔上,通过使用蓝牙查询扫描来确定信任设备是否还在范围里。步骤407根据查询扫描的结果来确定信任设备是否出现。如果信任设备出现,在步骤409,为特定的信任设备选定的敏感区域被解密,可选地,被保护设备解锁。如果信任设备没有出现,程序分流到步骤411,在该步骤敏感数据被加密,可选地,设备被锁定。步骤413是延时定时器,用于防止加密/解密循环之前太频繁的查询扫描造成的过多电源消耗,信任设备在建立与被保护设备联系的通信边缘时,可能发生所述太频繁的扫描。然后控制回到步骤405。
应该理解,根据本发明的这种或其他方法的一个优点是当信任设备不在时,被保护设备不需要完全失效。因此,蜂窝电话107没有耳机103可以继续使用,然而,被借蜂窝电话107的人尽管借电话打了电话,但没有耳机不能访问如蜂窝电话107的主人的个人电话本。
下列的代码阐述了在蓝牙设备里实施一个或多个本发明的实施例的软件程序的例子。下列代码根据可根据信任蓝牙设备是否在近邻来加密敏感备忘录:
//BlueMemoCEDlg.cpp:implementation file
#include“stdafx.h”
#include“BlueMemoCE.h”
#include“BlueMemoCEDlg.h”
#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[]=__FILE__;
#endif
#define TIMER_SCAN 4711
HWND gm_hDialog;
///////////////////////////////////////////////////////////////////
//CBlueMemoCEDlg dialog
CBlueMemoCEDlg::CBlueMemoCEDlg(CWnd*pParent/*=NULL*/)
:CDialog(CBlueMemoCEDlg::IDD,pParent)
{
//{{AFX_DATA_INIT(CBlueMemoCEDlg)
//}}AFX_DATA_INIT
m_hIcon=AfxGetApp()->LoadIcon(IDR_MAINFRAME);
m_pWBtAPI=NULL;
m_bDeviceFound=FALSE;
m_bMemoEncrypted=FALSE;
}
CBlueMemoCEDlg::~CBlueMemoCEDlg()
{
delete m_pWBtAPI;
m_pWBtAPI=NULL;
}
void CBlueMemoCEDlg::DoDataExchange(CDataExchange*pDX)
{
CDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(CBlueMemoCEDlg)
DDX_Control(pDX,IDC_MEMO,m_cMemo);
//}}AFX_DATA_MAP
}
BEGIN_MESSAGE_MAP(CBlueMemoCEDlg,CDialog)
//{{AFX_MSG_MAP(CBlueMemoCEDlg)
ON_WM_TIMER()
ON_REGISTERED_MESSAGE(WIDCOMM_WM_DISCOVERYEVENT,
OnDiscoveryEventMsg)
ON_REGISTERED_MESSAGE(WIDCOMM_WM_DEVICELOST,OnDeviceLost)
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
///////////////////////////////////////////////////////////////////
//CBlueMemoCEDlg message handlers
BOOL CBlueMemoCEDlg::OnInitDialog()
{
CDialog::OnInitDialog();
SetIcon(m_hIcon,TRUE); //Set big icon
SetIcon(m_hIcon,FALSE); //Set small icon
CenterWindow(GetDesktopWindow()); //center to hpc screen
gm_hDialog=this->GetSafeHwnd();
m_bDeviceFound=TURE;
SetMemoState();
SetTimer(TIMER_SCAN,50,NULL);
return TURE;
}
void CBlueMemoCEDlg::OnTimer(UINT nIDEvent)
{
switch(nIDEvent)
{
case TIMER_SCAN:
ScanForDevice();
break;
defaule:
break;
}
CDialog::OnTimer(nIDEvent);
}
BOOL CBlueMemoCEDlg::InitBluetooth()
{
BOOL bRet=TRUE;
if(NULL==m_pWBtAPI)
{
WBtRc rc=WBT_ERROR;
m_pWBtAPI=new CWBtAPI;
rc=m_pWBtAPI->ConnectToServer();
bRet=(rc==WBT_SUCCESS);
if(bRet)
{
m_pWBtAPI->SetOnDiscoveryEventCallback(cbDiscoveryEvent,
this);
m_pWBtAPI->SetOnDeviceLostCallback(cbDeviceLost,this);
}
}
return bRet;
}
void CBlueMemoCEDlg::ScanForDevice()
{
KillTimer(TIMER_SCAN);
if(!InitBluetooth())
{
m_bDeviceFound=FALSE;
SetMemoState();
SetTimer(TIMER_SCAN,3000,NULL);
Return;
}
//Hard coded device address for now.This should be
//selected from the paired devices list by the user.
BD_ADDR bda={0x00,0x0A,0xD9,0x5D,0x26,0x45};
GUID guid;
static const GUID sBTBaseGUID={0,0,0x1000,0x80,0x00,0x00,
0x80,0x5F,0x9B,0x34,0xFB};
memcpy(&guid,&sBTBaseGUID,sizeof(GUID));
guid.Data1=0x1101;
WBtRc rc=m_pWBtAPI->GapStartServiceDiscovery(bda,guid,TRUE);
if(rc!=WBT_SUCCESS)
{
AfxMessageBox(_T(“Unable to start service discovery!”));
}
}
Void CBlueMemoCEDlg::cbDiscoveryEvent(void*pUserDate,BD_ADDR bda,
UINT16 nRecs,long lResultCode)
{
class CDiscoveryEventPackage*pPackage=
new CDiscoveryEventPackage;
pPackage->m_pItemData=pUserData;
memcpy(pPackage->m_bda,bda,sizeof(BD_ADDR));
pPackage->m_nRecs =nRecs;
pPackage->m_lReturnCode =lResultCode;
::PostMessage(gm_hDialog,WIDCOMM_WM_DISCOVERYEVENT,0,
(LPARAM)pPackage);
}
void CBlueMemoCEDlg::cbDeviceLost(void*pUserData,BD_ADDR bda)
{
BD_ADDR dev_bda={0x00,0x0A,0xD9,0x5D,0x26,0x45};
::PostMessage(gm_hDialog,WIDCOMM_WM_DEVICELOST,0,0);
}
LRESULT CBlueMemoCEDlg::OnDiscoveryEventMsg(WPARAM wParam,LPARAM
lParam)
{
CDiscoveryEventPackage *pPackage=(CDiscoveryEventPackage
*)lParam;
if(pPackage && pPackage->m_nRecs)
{
m_bDeviceFound=TRUE;
}else{
m_bDeviceFound=FALSE;
SetTimer(TIMER_SCAN,3000,NULL);
}
SetMemoState();
Return 0;
}
LRESULT CBlueMemoCEDlg::OnDeviceLost(WPARAM wParam,LPARAM lParam)
{
SetTimer(TIMER_SCAN,3000,NULL);
SetMemoState();
return 0;
}
inline BYTE GetHexDigit(TCHAR c)
{
return(_istalpha(c))?(10+toupper(c)-T(‘A’)):
(c-_T(‘0’));
}
void CBlueMemoCEDlg::SetMemoState()
{
CString szMemo;
m_cMemo.GetWindowText(szMemo);
if(szMemo.GetLength()==0)
{
szMemo=_T(“Top secret memo!Top secret memo!Top secret memo!
Top secret memo!Top secret memo!”);
m_cMemo.SetWindowText(szMemo);
}
if(m_bDeviceFound && m_bMemoEncrypted)
{
Decrypt();
m_bMemoEncrypted=FALSE;
}
if(!m_bDeviceFound &&!m_bMemoEncrypted)
{
Encrypt();
m_bMemoEncrypted=TRUE;
}
}
void CBlueMemoCEDlg::Encrypt()
{
CString szMemo;
m_cMemo.GetWindowText(szMemo);
if(szMemo.GetLength()>0)
{
INT i,j;
CString szHex=_T(“”),szTmp=_T(“”);
TCHAR szBuffer[10];
m_cMemo.EnableWindow(FALSE);
for(i=0;i<szMemo.GetLength();i++)
{
TCHAR tch=(TCHAR)szMemo[i];
CHAR*ch=(char*)&tch;
for(j=0;j<sizeof(TCHAR);j++)
{
ZeroMeomory(szBuffer,sizeof(szBuffer));
_stprintf(szBuffer,_T(“%02X”),ch[j]);
szHex+=szBuffer;
}
szTmp=szHex+szMemo.Right(szMemo.GetLength()-i-1)
}
m_cMemo.SetWindowText(szTmp);
}
}
void CBlueMemoCEDlg::Decrypt()
{
CString szMemo;
m_cMemo.GetWindowText(szMemo);
if(szMemo.GetLength()>0)
{
INT i=0,j=0;
CString szPlain=_T(“”),szTmp=_T(“”);
m_cMemo.EnableWindow(TRUE);
i=szMemo.GetLength();
while(i)
{
TCHAR tch;
CHAR*ch=(char*)&tch;
INT k=i-4;
for(j=0;j<sizeof(TCHAR);j++)
{
ch[j]=GetHexDigit(szMemo[k++])*16+
GetHexDigit(szMemo[k++]);
}
i-=sizeof(TCHAR)*2;
szPlain=tch+szPlain;
szTmp=szMemo.Left(i)+szPlain;
}
m_cMemo.SetWindowText(szTmp);
}
}
在选择性的实施例里,蓝牙设备直到定时器溢出才实现敏感数据的加密算法。
注意到被保护设备和信任设备的任何组合都是可能的。例如,用户所有的几个包含敏感数据的设备可以和单个信任设备配对。信任设备可以采用“钥链”或者小的个人物品的形式,专门用来为用户的整个蓝牙设备组提供信任设备的功能。因此,一个人的敏感数据近邻授权给单个设备,而不让其它设备访问。在另一种变化中,单个的被保护设备可以与多个信任设备配对。因为每个信任设备可以与不同的敏感数据相关联,这便允许多个用户,甚至陌生人共享包含对他们每个人敏感的数据而不考虑其它用户会读取私人数据。这允许例如多个司机共享“汇总的”综合电话和全球定位系统服务,其中每个司机的私人地址信息都存储在汽车的电脑上。这也允许医院一般地加密私有医疗数据,但当例如病人在和终端同一个房间或者已经向他的或者她的医疗材料提供了密码时,允许医疗技术人员访问私人数据。
因此,本发明可以通过硬件、软件,或者软、硬件结合来实现。本发明可以在至少一个计算机系统中以集中方式实现,或者由分布在几个互连的计算机系统中的不同部分以分散方式实现。任何可以实现所述方法的计算机系统或其它设备都是可适用的。常用软硬件的结合可以是安装有计算机程序的通用计算机系统,通过安装和执行所述程序控制计算机系统,使其按所述方法运行。在计算机系统中,利用处理器和存储单元来实现所述方法。
本发明还可以通过计算机程序产品进行实施,所述程序包含能够实现本发明方法的全部特征,当其安装到计算机系统中时,通过运行,可以实现本发明的方法。本文件中的计算机程序所指的是:可以采用任何程序语言、代码或符号编写的一组指令的任何表达式,该指令组使系统具有信息处理能力,以直接实现特定功能,或在进行下述一个或两个步骤之后实现特定功能:a)转换成其它语言、编码或符号;b)以不同的格式再现。
本发明是参照几个实施例进行说明的,本领域技术人员应当明白,在不脱离本发明范围的情况下,还可以对本发明进行各种变换及等同替代。另外,针对特定情形或具体情况,可以对本发明做各种修改,而不脱离本发明的范围。因此,本发明不局限于所公开的具体实施例,而应当包括落入本发明权利要求范围内的全部实施方式。
Claims (7)
1、一种保护蓝牙设备的方法,其特征在于,包括:
a.配对两个蓝牙设备;
b.指定至少一个所述设备为另一个设备即被保护设备的信任设备;
c.指定至少一部分存储在所述被保护设备上的数据为敏感数据;
d.检测何时信任设备不再在所述被保护设备的近邻;
e.当信任设备不再在所述被保护设备的近邻时,加密所述敏感数据,
f.当检测到所述信任设备在所述被保护设备的近邻时,解密所述敏感数据以供用户浏览/编辑;
g、所述被保护设备为每个信任设备指定不同的敏感数据,并且设定定时器,延时预设时间后返回步骤d。
2、根据权利要求1所述的方法,其特征在于,进一步包括在该定时器溢出后加密所述敏感数据。
3、根据权利要求1所述的方法,其特征在于,当所述信任设备不再在所述被保护设备近邻时,将被保护设备锁定;当所述信任设备在所述被保护设备近邻时,将被保护设备解锁。
4、根据权利要求1所述的方法,其特征在于,被保护设备和一个以上的信任设备配对。
5、一种保护蓝牙设备上的数据的系统,其特征在于,包括至少一个第一蓝牙设备和至少一个第二蓝牙设备,所述第一蓝牙设备和所述第二蓝牙设备为两个配对的蓝牙设备,其中,所述第一蓝牙设备被指定为信任设备,所述第二蓝牙设备包含敏感数据,并且当所述第一蓝牙设备离开所述第二蓝牙设备近邻时,所述第二蓝牙设备加密所述敏感数据;所述第二蓝牙设备与至少一个所述第一蓝牙设备进行配对,并且所述第二蓝牙设备为至少一个所述第一蓝牙设备包含了独立的敏感数据。
6、根据权利要求5所述的系统,其特征在于,还包括定时器,在该定时器溢出后,所述设备的所述第二个加密所述数据。
7、根据权利要求5所述的系统,其特征在于,当所述设备的所述第一个不再在所述设备的所述第二个近邻时,所述设备的所述第二个被锁定。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/074,271 | 2005-03-07 | ||
US11/074,271 US7463861B2 (en) | 2005-03-07 | 2005-03-07 | Automatic data encryption and access control based on bluetooth device proximity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1831835A CN1831835A (zh) | 2006-09-13 |
CN100458810C true CN100458810C (zh) | 2009-02-04 |
Family
ID=36499491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100588610A Expired - Fee Related CN100458810C (zh) | 2005-03-07 | 2006-03-03 | 保护蓝牙设备的方法及系统 |
Country Status (5)
Country | Link |
---|---|
US (4) | US7463861B2 (zh) |
EP (1) | EP1701566B1 (zh) |
CN (1) | CN100458810C (zh) |
DE (1) | DE602005026774D1 (zh) |
TW (1) | TWI347767B (zh) |
Families Citing this family (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1947372A (zh) * | 2004-04-23 | 2007-04-11 | 松下电器产业株式会社 | 个人信息管理装置、分散密钥存储装置、个人信息管理系统 |
US7925212B2 (en) * | 2005-03-07 | 2011-04-12 | Broadcom Corporation | Automatic network and device configuration for handheld devices based on bluetooth device proximity |
US7463861B2 (en) * | 2005-03-07 | 2008-12-09 | Broadcom Corporation | Automatic data encryption and access control based on bluetooth device proximity |
US7424267B2 (en) * | 2005-03-07 | 2008-09-09 | Broadcom Corporation | Automatic resource availability using Bluetooth |
US7480521B2 (en) * | 2005-09-15 | 2009-01-20 | Research In Motion Limited | Methods and apparatus for reducing power consumption during network scanning operations with adverse battery conditions |
EP1768434A1 (en) * | 2005-09-21 | 2007-03-28 | Thomson Telecom Belgium | Method and a device to suspend the access to a service |
US8483853B1 (en) | 2006-09-12 | 2013-07-09 | Sonos, Inc. | Controlling and manipulating groupings in a multi-zone media system |
US9202509B2 (en) * | 2006-09-12 | 2015-12-01 | Sonos, Inc. | Controlling and grouping in a multi-zone media system |
US8788080B1 (en) | 2006-09-12 | 2014-07-22 | Sonos, Inc. | Multi-channel pairing in a media system |
US7706750B2 (en) * | 2007-05-07 | 2010-04-27 | Dell Products L.P. | Enabling bluetooth support within a secondary and/or across multiple operating system partitions |
KR101352248B1 (ko) * | 2007-08-30 | 2014-01-16 | 삼성전자주식회사 | 사용자 인터페이스 자동 전환 장치 및 방법 |
KR101427268B1 (ko) * | 2007-12-21 | 2014-08-06 | 엘지전자 주식회사 | 이동 단말기 및 그의 전화 연결 방법 |
US8437313B2 (en) * | 2008-12-23 | 2013-05-07 | Research In Motion Limited | Scanning methods and apparatus for mobile devices in wireless local area networks for reduced power consumption |
CN102132614B (zh) | 2009-04-24 | 2016-01-20 | 骷髅头有限公司 | 无线同步机制 |
GB0908406D0 (en) | 2009-05-15 | 2009-06-24 | Cambridge Silicon Radio Ltd | Proximity pairing |
US8282829B2 (en) * | 2009-05-20 | 2012-10-09 | Baxter International Inc. | System and method for automated data collection of twenty-four hour ultrafiltration and other patient parameters using wired or wireless technology |
US8190129B2 (en) | 2009-06-22 | 2012-05-29 | Mourad Ben Ayed | Systems for three factor authentication |
US8045961B2 (en) * | 2009-06-22 | 2011-10-25 | Mourad Ben Ayed | Systems for wireless authentication based on bluetooth proximity |
US8112066B2 (en) | 2009-06-22 | 2012-02-07 | Mourad Ben Ayed | System for NFC authentication based on BLUETOOTH proximity |
US8498618B2 (en) | 2009-06-22 | 2013-07-30 | Mourad Ben Ayed | Systems for intelligent authentication based on proximity |
US8260262B2 (en) | 2009-06-22 | 2012-09-04 | Mourad Ben Ayed | Systems for three factor authentication challenge |
FR2948517A1 (fr) * | 2009-07-21 | 2011-01-28 | St Ericsson Sa St Ericsson Ltd | Dispositif et procede de detection d'un accessoire bluetooth |
US8989883B2 (en) | 2010-03-25 | 2015-03-24 | Verisign, Inc. | Systems and methods for providing access to resources through enhanced audio signals |
US8542833B2 (en) * | 2010-06-12 | 2013-09-24 | Bao Tran | Systems and methods to secure laptops or portable computing devices |
US9047451B2 (en) | 2010-09-24 | 2015-06-02 | Blackberry Limited | Method and apparatus for differentiated access control |
CA2811659C (en) * | 2010-09-24 | 2018-02-13 | Research In Motion Limited | Method and apparatus for differentiated access control |
US8254840B2 (en) * | 2010-11-24 | 2012-08-28 | GM Global Technology Operations LLC | Auto configuration for a dial-up networking system |
US8933782B2 (en) | 2010-12-28 | 2015-01-13 | Toyota Motor Engineering & Manufaturing North America, Inc. | Mobile device connection system |
TWM408094U (en) * | 2010-12-29 | 2011-07-21 | Deutron Electronics Corp | storage device |
US11265652B2 (en) | 2011-01-25 | 2022-03-01 | Sonos, Inc. | Playback device pairing |
US11429343B2 (en) | 2011-01-25 | 2022-08-30 | Sonos, Inc. | Stereo playback configuration and control |
US8627433B2 (en) | 2011-09-30 | 2014-01-07 | GM Global Technology Operations LLC | System and method for authenticating a request for access to a secured device |
US9021557B2 (en) * | 2011-10-27 | 2015-04-28 | Stmicroelectronics Pte Ltd | System and method for security using a sibling smart card |
EP2795518A4 (en) | 2011-12-22 | 2015-09-02 | Intel Corp | INCORPORATED FLIGHT REACTION SUBSYSTEM ALWAYS AVAILABLE |
US9520048B2 (en) | 2011-12-22 | 2016-12-13 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095583A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095585A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
US9454678B2 (en) | 2011-12-22 | 2016-09-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
US9507918B2 (en) | 2011-12-22 | 2016-11-29 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095586A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013095588A1 (en) | 2011-12-22 | 2013-06-27 | Intel Corporation | Always-available embedded theft reaction subsystem |
JP5784753B2 (ja) * | 2011-12-22 | 2015-09-24 | インテル・コーポレーション | 常時稼働組み込み式盗難反応サブシステム |
US9552500B2 (en) | 2011-12-22 | 2017-01-24 | Intel Corporation | Always-available embedded theft reaction subsystem |
WO2013100899A1 (en) * | 2011-12-27 | 2013-07-04 | Intel Corporation | Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely |
US9729115B2 (en) | 2012-04-27 | 2017-08-08 | Sonos, Inc. | Intelligently increasing the sound level of player |
US9713675B2 (en) | 2012-07-17 | 2017-07-25 | Elwha Llc | Unmanned device interaction methods and systems |
US9044543B2 (en) | 2012-07-17 | 2015-06-02 | Elwha Llc | Unmanned device utilization methods and systems |
US9166958B2 (en) | 2012-07-17 | 2015-10-20 | Texas Instruments Incorporated | ID-based control unit-key fob pairing |
US8467770B1 (en) | 2012-08-21 | 2013-06-18 | Mourad Ben Ayed | System for securing a mobile terminal |
US9008330B2 (en) | 2012-09-28 | 2015-04-14 | Sonos, Inc. | Crossover frequency adjustments for audio speakers |
WO2014093224A1 (en) * | 2012-12-10 | 2014-06-19 | Bensussen Deutsch & Associates, Inc. | Mobile device accessory having a low power drain electronic display |
US9398448B2 (en) * | 2012-12-14 | 2016-07-19 | Intel Corporation | Enhanced wireless communication security |
CN103037537B (zh) * | 2012-12-14 | 2015-07-08 | 南京邮电大学 | 蓝牙设备发现过程时延优化方法 |
US9942750B2 (en) | 2013-01-23 | 2018-04-10 | Qualcomm Incorporated | Providing an encrypted account credential from a first device to a second device |
US20140317420A1 (en) * | 2013-04-22 | 2014-10-23 | Knightsbridge Portable Communications Sp | Encrypted data storage apparatus |
US9137659B2 (en) | 2013-04-25 | 2015-09-15 | FusionPipe Software Solutions Inc. | Method and system for decoupling user authentication and data encryption on mobile devices |
US9231765B2 (en) | 2013-06-18 | 2016-01-05 | Arm Ip Limited | Trusted device |
US9264421B2 (en) * | 2013-08-22 | 2016-02-16 | Google Technology Holdings LLC | Accessing a primary device using a wearable device and a wireless link |
US9948359B2 (en) | 2013-09-20 | 2018-04-17 | At&T Intellectual Property I, L.P. | Secondary short-range wireless assist for wireless-based access control |
CZ306674B6 (cs) * | 2013-10-03 | 2017-05-03 | Software602 A.S. | Způsob zabezpečení mobilních zařízení |
CN104751064A (zh) * | 2013-12-27 | 2015-07-01 | 珠海金山办公软件有限公司 | 一种文档加密提示方法及系统 |
US9942751B2 (en) | 2014-01-29 | 2018-04-10 | Netiq Corporation | Audio proximity-based mobile device data sharing |
US9226073B2 (en) | 2014-02-06 | 2015-12-29 | Sonos, Inc. | Audio output balancing during synchronized playback |
US10212136B1 (en) | 2014-07-07 | 2019-02-19 | Microstrategy Incorporated | Workstation log-in |
US10587595B1 (en) * | 2014-12-30 | 2020-03-10 | Acronis International Gmbh | Controlling access to content |
US9558377B2 (en) | 2015-01-07 | 2017-01-31 | WaveLynx Technologies Corporation | Electronic access control systems including pass-through credential communication devices and methods for modifying electronic access control systems to include pass-through credential communication devices |
US9706394B2 (en) | 2015-03-06 | 2017-07-11 | Apple Inc. | Communicating messages with intermittently available encryption credentials |
JP2016178385A (ja) * | 2015-03-18 | 2016-10-06 | キヤノン株式会社 | 通信システム、情報処理装置、通信制御方法およびプログラム |
US10701067B1 (en) | 2015-04-24 | 2020-06-30 | Microstrategy Incorporated | Credential management using wearable devices |
CN104991450B (zh) * | 2015-04-24 | 2017-07-28 | 深圳市昇润科技有限公司 | 智能蓝牙电子产品集成设备的配对方法与操控方法 |
US10248376B2 (en) | 2015-06-11 | 2019-04-02 | Sonos, Inc. | Multiple groupings in a playback system |
US10136214B2 (en) | 2015-08-11 | 2018-11-20 | Google Llc | Pairing of media streaming devices |
WO2017030584A1 (en) * | 2015-08-20 | 2017-02-23 | Hewlett-Packard Development Company, L.P. | Peripheral device pairing |
EP3133524B1 (en) * | 2015-08-21 | 2021-04-14 | Pushpull Technology Limited | Data collaboration |
US10742681B2 (en) | 2015-08-21 | 2020-08-11 | PushPull Technology Limited | Data collaboration |
US11038687B2 (en) | 2015-08-21 | 2021-06-15 | PushPull Technology Limited | Data collaboration |
CN105631345B (zh) * | 2015-08-28 | 2018-05-15 | 宇龙计算机通信科技(深圳)有限公司 | 一种多域用户文件系统加密方法及系统 |
US10855664B1 (en) | 2016-02-08 | 2020-12-01 | Microstrategy Incorporated | Proximity-based logical access |
US10231128B1 (en) | 2016-02-08 | 2019-03-12 | Microstrategy Incorporated | Proximity-based device access |
US10666642B2 (en) * | 2016-02-26 | 2020-05-26 | Ca, Inc. | System and method for service assisted mobile pairing of password-less computer login |
US20170288870A1 (en) * | 2016-04-05 | 2017-10-05 | Google Inc. | Methods and systems of securing and retrieving secret information |
US10712997B2 (en) | 2016-10-17 | 2020-07-14 | Sonos, Inc. | Room association based on name |
US10318723B1 (en) * | 2016-11-29 | 2019-06-11 | Sprint Communications Company L.P. | Hardware-trusted network-on-chip (NOC) and system-on-chip (SOC) network function virtualization (NFV) data communications |
US10548015B2 (en) * | 2017-01-09 | 2020-01-28 | Bitwave Pte Ltd | Mobile device security lock |
US10771458B1 (en) | 2017-04-17 | 2020-09-08 | MicoStrategy Incorporated | Proximity-based user authentication |
US10657242B1 (en) | 2017-04-17 | 2020-05-19 | Microstrategy Incorporated | Proximity-based access |
US11140157B1 (en) | 2017-04-17 | 2021-10-05 | Microstrategy Incorporated | Proximity-based access |
CN114363868A (zh) * | 2020-09-30 | 2022-04-15 | 华为技术有限公司 | 一种蓝牙系统、蓝牙耳机和密码验证方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US6092201A (en) * | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list |
US20030199267A1 (en) * | 2000-11-22 | 2003-10-23 | Fujitsu Limited | Security system for information processing apparatus |
US20040029563A1 (en) * | 2000-09-11 | 2004-02-12 | Thornsten Berg | Method and system for controlling access |
US20040123106A1 (en) * | 2002-08-27 | 2004-06-24 | Lexent Technologies, Inc. | Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6772331B1 (en) * | 1999-05-21 | 2004-08-03 | International Business Machines Corporation | Method and apparatus for exclusively pairing wireless devices |
DE10047066A1 (de) * | 2000-09-22 | 2002-04-18 | Porsche Ag | Kamera, eingebaut in ein Kraftfahrzeug |
EP1213882A3 (en) | 2000-12-08 | 2002-09-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method, system and device for granting access to a service |
US6832242B2 (en) | 2000-12-28 | 2004-12-14 | Intel Corporation | System and method for automatically sharing information between handheld devices |
FI113145B (fi) | 2001-05-03 | 2004-02-27 | Nokia Corp | Laitteen piilottaminen |
CN100380825C (zh) | 2001-08-15 | 2008-04-09 | 高通股份有限公司 | 双模式蓝牙/无线设备以及同步该设备的方法 |
US20040125762A1 (en) | 2001-08-17 | 2004-07-01 | Amit Haller | Device, system, method and computer readable medium for attaching to a device identifited by an access point name in a wide area network providing particular services |
US20030083047A1 (en) | 2001-10-29 | 2003-05-01 | Garland Phillips | Method and communication network for providing operating information associated with a wireless device |
US6845097B2 (en) | 2001-11-21 | 2005-01-18 | Ixi Mobile (Israel) Ltd. | Device, system, method and computer readable medium for pairing of devices in a short distance wireless network |
US7202783B2 (en) | 2001-12-18 | 2007-04-10 | Intel Corporation | Method and system for identifying when a first device is within a physical range of a second device |
US20030139180A1 (en) | 2002-01-24 | 2003-07-24 | Mcintosh Chris P. | Private cellular network with a public network interface and a wireless local area network extension |
US7313678B2 (en) | 2003-03-05 | 2007-12-25 | Broadcom Corporation | Installation procedure for wireless human interface device |
US7773972B2 (en) * | 2002-05-15 | 2010-08-10 | Socket Mobile, Inc. | Functionality and policies based on wireless device dynamic associations |
US20060041760A1 (en) * | 2002-06-26 | 2006-02-23 | Zezhen Huang | Trusted computer activity monitoring and recording system and method |
US7340236B2 (en) | 2002-08-07 | 2008-03-04 | Texas Instruments Incorporated | System for operational coexistence of wireless communication technologies |
EP1530853A2 (en) | 2002-08-23 | 2005-05-18 | Matsushita Electric Industrial Co., Ltd. | Wireless communication system |
KR20050070152A (ko) | 2002-10-02 | 2005-07-05 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 휴대 가능한 디바이스의 스마트 연결 관리 |
US20040126038A1 (en) | 2002-12-31 | 2004-07-01 | France Telecom Research And Development Llc | Method and system for automated annotation and retrieval of remote digital content |
US20040203381A1 (en) | 2002-12-31 | 2004-10-14 | Cahn Janet E. | Method and apparatus for data transfer |
US7134015B2 (en) * | 2003-01-16 | 2006-11-07 | International Business Machines Corporation | Security enhancements for pervasive devices |
JP2004260274A (ja) | 2003-02-24 | 2004-09-16 | Nec Corp | 携帯端末データメモリ共有システム及び携帯端末データメモリ共有機能を実現させるためのプログラム |
US7107010B2 (en) | 2003-04-16 | 2006-09-12 | Nokia Corporation | Short-range radio terminal adapted for data streaming and real time services |
MXPA05013249A (es) | 2003-06-19 | 2006-03-09 | Sony Ericsson Mobile Comm Ab | Multiples dispositivos que comparten un accesorio comun. |
US20040264410A1 (en) | 2003-06-30 | 2004-12-30 | Motorola, Inc. | Method and apparatus for providing a communication unit with a handoff between networks |
EP1511235A1 (en) | 2003-08-28 | 2005-03-02 | Alcatel | Distributed pairing between different terminals |
EP2937805B1 (en) * | 2003-09-30 | 2022-01-05 | Nxp B.V. | Proximity authentication system |
US7415242B1 (en) | 2003-11-10 | 2008-08-19 | Sprint Spectrum L.P. | Method and system for proximity detection for an in-building wireless repeater |
US20050136834A1 (en) | 2003-12-19 | 2005-06-23 | Motorola, Inc. | Communication system with adopted remote identity |
US20050266826A1 (en) | 2004-06-01 | 2005-12-01 | Nokia Corporation | Method for establishing a security association between a wireless access point and a wireless node in a UPnP environment |
US7509131B2 (en) | 2004-06-29 | 2009-03-24 | Microsoft Corporation | Proximity detection using wireless signal strengths |
US20060083187A1 (en) | 2004-10-18 | 2006-04-20 | Mobile (R&D) Ltd. | Pairing system and method for wirelessly connecting communication devices |
US7330696B2 (en) | 2004-11-24 | 2008-02-12 | Symbol Technologies, Inc. | System and method for multi-mode radio operation |
US7463861B2 (en) | 2005-03-07 | 2008-12-09 | Broadcom Corporation | Automatic data encryption and access control based on bluetooth device proximity |
US7925212B2 (en) | 2005-03-07 | 2011-04-12 | Broadcom Corporation | Automatic network and device configuration for handheld devices based on bluetooth device proximity |
US7424267B2 (en) | 2005-03-07 | 2008-09-09 | Broadcom Corporation | Automatic resource availability using Bluetooth |
-
2005
- 2005-03-07 US US11/074,271 patent/US7463861B2/en active Active
- 2005-10-20 EP EP05022891A patent/EP1701566B1/en active Active
- 2005-10-20 DE DE602005026774T patent/DE602005026774D1/de active Active
-
2006
- 2006-03-03 CN CNB2006100588610A patent/CN100458810C/zh not_active Expired - Fee Related
- 2006-03-06 TW TW095107404A patent/TWI347767B/zh active
-
2008
- 2008-12-09 US US12/330,998 patent/US7756478B2/en active Active
-
2010
- 2010-07-13 US US12/835,529 patent/US8019283B2/en not_active Expired - Fee Related
-
2011
- 2011-08-23 US US13/215,957 patent/US8165525B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US6092201A (en) * | 1997-10-24 | 2000-07-18 | Entrust Technologies | Method and apparatus for extending secure communication operations via a shared list |
US20040029563A1 (en) * | 2000-09-11 | 2004-02-12 | Thornsten Berg | Method and system for controlling access |
US20030199267A1 (en) * | 2000-11-22 | 2003-10-23 | Fujitsu Limited | Security system for information processing apparatus |
US20040123106A1 (en) * | 2002-08-27 | 2004-06-24 | Lexent Technologies, Inc. | Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication |
Also Published As
Publication number | Publication date |
---|---|
US8019283B2 (en) | 2011-09-13 |
DE602005026774D1 (de) | 2011-04-21 |
US20060199538A1 (en) | 2006-09-07 |
US20110007900A1 (en) | 2011-01-13 |
EP1701566B1 (en) | 2011-03-09 |
US7756478B2 (en) | 2010-07-13 |
US20110305340A1 (en) | 2011-12-15 |
US20090093215A1 (en) | 2009-04-09 |
TW200701725A (en) | 2007-01-01 |
US7463861B2 (en) | 2008-12-09 |
EP1701566A1 (en) | 2006-09-13 |
US8165525B2 (en) | 2012-04-24 |
CN1831835A (zh) | 2006-09-13 |
TWI347767B (en) | 2011-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100458810C (zh) | 保护蓝牙设备的方法及系统 | |
RU2415470C2 (ru) | Способ создания безопасного кода, способы его использования и программируемое устройство для осуществления способа | |
CN100374971C (zh) | 基于接近令牌单元对应用服务的安全访问 | |
US9253167B2 (en) | Device and system for facilitating communication and networking within a secure mobile environment | |
US7930556B2 (en) | Fingerprint system and method for access control | |
JP2007174633A (ja) | トークンデバイス及びセキュアメモリデバイスのためのバインディング鍵をセキュアに取得するためのコンピュータ実施方法、および、トークンデバイスとセキュアメモリデバイスとをセキュアにバインドするシステム | |
CN103458382A (zh) | 一种手机私密短信的硬件加密传输和存储方法及系统 | |
CN105745660A (zh) | 用于在客户机设备上支持多个数字权利管理协议的技术 | |
CN1910531B (zh) | 数据资源的密钥控制使用的方法和系统以及相关网络 | |
CN104717643B (zh) | 一种移动设备安全通信平台 | |
JP2013515301A (ja) | 汎用カードシステムの実現方法、システム及びスマートカード | |
JP2006072996A (ja) | ディスプレイ上にセキュア状態インジケータを表示するシステムおよび方法 | |
JP2006228139A (ja) | セキュリティ管理システム | |
US20110170689A1 (en) | Terminal and method for processing encrypted message | |
JP2005122567A (ja) | デバイス間において認証用情報を委譲する情報処理方法及び情報処理システム | |
US20100090001A1 (en) | Method and terminal for providing controlled access to a memory card | |
JP2009017294A (ja) | 情報処理システムおよび情報処理方法 | |
JPH063905B2 (ja) | センタと利用者間の相手認証方法 | |
TW201413492A (zh) | 用於得到對一服務之安全存取之方法 | |
JP7045040B2 (ja) | 通信端末 | |
US11876797B2 (en) | Multi-factor geofencing system for secure encryption and decryption system | |
JP2014026383A (ja) | 携帯端末、携帯端末の認証システム、携帯端末の認証方法及びプログラム | |
JP2008011100A (ja) | 属性認証方法、属性証明書生成装置、サービス提供先装置、サービス提供元装置、及び属性認証システム | |
JP2008011097A (ja) | 属性認証方法、鍵管理装置、サービス提供先装置、サービス提供元装置、及び属性認証システム | |
Jansen et al. | Smart Cards and Mobile Device Authentication: An Overview and Implementation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090204 Termination date: 20160303 |
|
CF01 | Termination of patent right due to non-payment of annual fee |